After Action ReportDefenseMichael KelleyMilitaryNSASpyingSurveillanceVerizon Allegedly Built A Fiber Optic Cable To Give The Feds Access To CommunicationsVerizon allegedly set up a fiber-optic line running from New Jersey to Virginia to give the government access to all communications.2013-06-10http://www.businessinsider.com/verizon-gives-all-data-to-the-government-2013-62013-06-28 14:46:47attachmentSnapshot2013-06-28 14:46:47http://www.businessinsider.com/verizon-gives-all-data-to-the-government-2013-6text/htmlutf-8newspaperArticleReuters

Shady Companies With Ties to Israel Wiretap the U.S. for the NSA | Threat Level | Wired.comThe NSA is growing bigger and more powerful. But behind its curtains of secrecy, the secretive spying agency is relying on contractors with checkered pasts and ties to Israeli intelligence to build out and run its massive eavesdropping operations.2012-04-03http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/2013-06-28 14:47:40attachmentSnapshot2013-06-28 14:47:40http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/all/1text/htmlutf-8newspaperArticleWired UK

WrightPaul

Meet Prism's little brother: Socmint (Wired UK)For the past two years a tight-lipped and little talked about unit within the Metropolitan Police has been conducting blanket surveillance of British citizens' public social media conversations2013-06-26Meet Prism's little brotherhttp://www.wired.co.uk/news/archive/2013-06/26/socmint2013-06-28 14:47:53attachmentSnapshot2013-06-28 14:47:53http://www.wired.co.uk/news/archive/2013-06/26/socminttext/htmlutf-8newspaperArticleWired UK

ShubberKadhim

A simple guide to GCHQ's internet surveillance programme Tempora (Wired UK)What is Tempora? How does GCHQ analyse torrents of the world's internet data and how does it differ from the NSA's Prism programme?2013-06-24http://www.wired.co.uk/news/archive/2013-06/24/gchq-tempora-1012013-06-28 14:48:01attachmentSnapshot2013-06-28 14:48:01http://www.wired.co.uk/news/archive/2013-06/24/gchq-tempora-101text/htmlutf-8newspaperArticleZDNet

Jr.Neil

Spy agency taps into undersea cable | ZDNetThe NSA is looking for new ways to snoop, since advances in telecommunications have muffled its ears. Now it's splicing into undersea fiber-optic cables-a potentially illegal and not-yet-successful move.2001-05-23http://www.zdnet.com/news/spy-agency-taps-into-undersea-cable/1158772013-06-28 14:48:17attachmentSnapshot2013-06-28 14:48:17http://www.zdnet.com/news/spy-agency-taps-into-undersea-cable/115877text/htmlutf-8webpageDemocracy Now!

GoodmanAmy

James Bamford: "The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America"The Bush administration’s wiretapping program has come under new scrutiny this week. Two influential congressional committees have opened probes into allegations US intelligence spied on the phone calls of American military personnel, journalists and aid workers in Iraq. We speak to James Bamford about the NSA’s spying on Americans, the agency’s failings pre-9/11 and the ties between NSA and the nation’s telecommunications companies. [includes rush transcript]2008-10-14James Bamfordhttp://www.democracynow.org/2008/10/14/james_bamford_the_shadow_factory_the2013-06-28 14:48:21attachmentSnapshot2013-06-28 14:48:21http://www.democracynow.org/2008/10/14/james_bamford_the_shadow_factory_the#text/htmlutf-8newspaperArticleComment is free

KinzerStephen

BoliviaCubaEcuadorEdward SnowdenPeruUnited StatesUS politicsVenezuelaWorld newsLatin America is ready to defy the US over Snowden and other issuesLatin America has long lived in the US shadow, but the fact that some countries might take Snowden shows how that's changed2013-06-25T12:16EDTen-GBhttp://www.guardian.co.uk/commentisfree/2013/jun/25/edward-snowden-ecuador-defy-united-states2013-06-28 14:52:10The GuardianThe GuardianISSN 0261-3077attachmentGuardian Snapshot2013-06-28 14:52:17http://www.guardian.co.uk/commentisfree/2013/jun/25/edward-snowden-ecuador-defy-united-statestext/htmlutf-8videoRecordingNashvilleTennesseeOfficial: Water complaints could be 'act of terrorism'NASHVILLE -- A Tennessee Department of Environment and Conservation deputy director warned a group of Maury County residents that unfounded complaints about water quality could be considered an 'act of terrorism.'2013-06-21Officialhttp://www.usatoday.com/story/news/nation/2013/06/21/official-says-water-complaints-act-of-terrorism/2445071/2013-06-28 14:52:22www.usatoday.comattachmentSnapshot2013-06-28 14:52:22http://www.usatoday.com/story/news/nation/2013/06/21/official-says-water-complaints-act-of-terrorism/2445071/text/htmlutf-8webpageCBS News

OrrBob

CIADavid Petraeusdpst cbspetraeusPaula BroadwellresignationEmail investigation led to discovery of Petraeus' affairWhen the CIA director's name surfaced in another probe, agents became concerned Petraeus or his email accounts may have been compromised2012-11-10http://www.cbsnews.com/8301-18563_162-57548122/email-investigation-led-to-discovery-of-petraeus-affair/2013-06-28 14:52:36attachmentSnapshot2013-06-28 14:52:36http://www.cbsnews.com/8301-18563_162-57548122/email-investigation-led-to-discovery-of-petraeus-affair/text/htmliso-8859-1newspaperArticleU.S.

LiptakAdam

Decisions and VerdictsFourth Amendment (US Constitution)Prisons and PrisonersSearch and SeizureStates (US)Supreme CourtJustices Approve Strip Searches for Any OffenseThe court ruled that people arrested for any offense, however minor, may be forced to strip before being jailed, even if there is no suspicion of contraband.2012-04-02https://www.nytimes.com/2012/04/03/us/justices-approve-strip-searches-for-any-offense.html2013-06-28 14:52:44NYTimes.comThe New York TimesISSN 0362-4331attachmentNew York Times Snapshot2013-06-28 14:53:05https://www.nytimes.com/2012/04/03/us/justices-approve-strip-searches-for-any-offense.html?_r=1&pagewanted=alltext/htmlutf-8newspaperArticleThe Atlantic Wire

BumpPhilip

Barack ObamaFISAPrivacyMeet the 16 People Responsible for Protecting Your PrivacyThere are two groups appointed with the task of ensuring that the government doesn't invade your privacy. The first is a secret court comprised of judges with heavy background in prosecution. The second is a civilian panel which the president is meeting with for the first time today. Feel better?2013-06-21http://www.theatlanticwire.com/politics/2013/06/meet-16-people-responsible-protecting-your-privacy/66473/2013-06-28 14:52:47attachmentSnapshot2013-06-28 14:52:47http://www.theatlanticwire.com/politics/2013/06/meet-16-people-responsible-protecting-your-privacy/66473/text/htmlutf-8newspaperArticleMashable

Franceschi-BicchieraiLorenzo

google wikileaks uncategorized us-world us worldGoogle Handed Over Emails of Wikileaks Volunteers to U.S. GovernmentGoogle handed over a vast amount of data pertaining to the Gmail accounts of two former Wikileaks volunteers to the U.S. government.2013-06-22http://mashable.com/2013/06/22/google-wikileaks/2013-06-28 14:53:01attachmentDisclosure Order EC139.pdfapplication/pdfattachmentDisclosure Order SW 594.pdfapplication/pdfattachmentOn Confirmed Assumptions2013-09-17 19:49:56http://anarchism.is/text/htmlutf-8attachmentOrder-EC105.pdfapplication/pdfattachmentOrder EC139.pdfapplication/pdfattachmentSnapshot2013-06-28 14:53:01http://mashable.com/2013/06/22/google-wikileaks/text/htmlutf-8attachmentWarrant SW594.pdfapplication/pdfnewspaperArticleFirstpostchinaEdward Snowdenhong konginternet freedomjohn kerryNSArussiasnoopingtheysaiditusKerry defends NSA surveillance, slams Snowden'We do not look at content. We do not look at individual emails. We do not listen to people's calls. We take painstaking efforts sometimes at the expense of endangering ourselves, to protect the rights of people, he said.2013-06-24http://www.firstpost.com/world/john-kerry-defends-nsa-surveillance-slams-edward-snowden-901079.html2013-06-28 14:53:13attachmentSnapshot2013-06-28 14:53:13http://www.firstpost.com/world/john-kerry-defends-nsa-surveillance-slams-edward-snowden-901079.htmltext/htmlutf-8newspaperArticleWorld newsThe GuardianISSN 0261-3077

GreenwaldGlenn

BallJames

Fisa courtLawNSAObama administrationPrismPrivacySurveillanceThe NSA filesUS constitution and civil libertiesUS national securityWorld newsThe top secret rules that allow NSA to use US data without a warrantFisa court submissions show broad scope of procedures governing NSA's surveillance of Americans' communication• Document one: procedures used by NSA to target non-US persons• Document two: procedures used by NSA to minimise data collected from US persons2013-06-20T18:59EDTen-GBhttp://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant2013-06-28 14:53:19The GuardianattachmentGuardian Snapshot2013-06-28 14:53:26http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warranttext/htmlutf-8newspaperArticleComment is freeThe GuardianISSN 0261-3077

Stop & Frisk Accomplishments: Barely Any Illegal Weapons Recovered, But Tons Of Weed Smokers Jailed | TechdirtWe've already discussed the abomination NYC Mayor Bloomberg has unleashed on his own people in the form of random searches of scary dark-skinned people, more commonly known as stop and frisk. The justification of a blatantly racist policy that...2013-05-30Stop & Frisk Accomplishmentshttps://www.techdirt.com/articles/20130523/08220523185/stop-frisk-accomplishments-barely-any-illegal-weapons-recovered-tons-weed-smokers-jailed.shtml2013-06-28 14:53:34attachmentSnapshot2013-06-28 14:53:34https://www.techdirt.com/articles/20130523/08220523185/stop-frisk-accomplishments-barely-any-illegal-weapons-recovered-tons-weed-smokers-jailed.shtmltext/htmliso-8859-1videoRecording

SpitzMalte

dataTalkstechnologyTEDtelecomMalte Spitz: Your phone company is watching | Video on TED.comWhat kind of data is your cell phone company collecting? Malte Spitz wasn’t too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830 lines of code -- a detailed, nearly minute-by-minute account of half a year of his life.2012-0610:10EnglishMalte Spitzhttp://www.ted.com/talks/malte_spitz_your_phone_company_is_watching.html2013-06-28 14:53:46www.ted.comCC-BY-NC-NDattachmentMalteSpitz_2012G-480p.mp4video/mp4windows-1252attachmentSnapshot2013-06-28 14:53:46http://www.ted.com/talks/malte_spitz_your_phone_company_is_watching.html#text/htmlutf-8newspaperArticleArs Technica

GoodinDan

Use of Tor and e-mail crypto could increase chances that NSA keeps your dataWhen it comes to surveillance rules, some US people are more equal than others.2013-06-20http://arstechnica.com/tech-policy/2013/06/use-of-tor-and-e-mail-crypto-could-increase-chances-that-nsa-keeps-your-data/2013-06-28 14:53:53attachmentSnapshot2013-06-28 14:53:53http://arstechnica.com/tech-policy/2013/06/use-of-tor-and-e-mail-crypto-could-increase-chances-that-nsa-keeps-your-data/text/htmlutf-8newspaperArticleSpiegel Online

AugsteinJakob

InternetUnited StatesJakob Augstein: Data Spying Programs Threaten German SecurityOverzealous data collectors in the US and Great Britain have no right to investigate German citizens. The German government must protect people from unauthorized access by foreign intelligence agencies, and it must act now. This is a matter of national security.24.06.2013Jakob Augsteinhttp://www.spiegel.de/international/germany/jakob-augstein-data-spying-programs-threaten-german-security-a-907577.html2013-06-28 14:53:59Spiegel OnlineattachmentJakob Augstein: Data Spying Programs Threaten German Security - SPIEGEL ONLINE2013-06-28 14:54:02http://www.spiegel.de/international/germany/jakob-augstein-data-spying-programs-threaten-german-security-a-907577.htmltext/htmliso-8859-1newspaperArticleThe Atlantic

U.S. Surveillance Is Not Aimed at TerroristsThe debate over the U.S. government’s monitoring of digital communications suggests that Americans are willing to allow it as long as it is genuinely targeted at terrorists. What they fail to realize is that the surveillance systems are best suited for gathering information on law-abiding citizens.2013-06-23http://www.bloomberg.com/news/2013-06-23/u-s-surveillance-is-not-aimed-at-terrorists.html2013-06-28 14:54:12attachmentBloomberg Printable2013-06-28 14:54:20http://www.bloomberg.com/news/print/2013-06-23/u-s-surveillance-is-not-aimed-at-terrorists.htmltext/htmlutf-8newspaperArticleComment is freeThe GuardianISSN 0261-3077

Perfect Forward Secrecy can block the NSA from secure web pages, but no one uses itPerfect Forward Privacy is an obscure SSL configuration option that increases security. Until a few days ago, I had never heard of it. Almost no one uses it. Without it, a single piece of data is all that stands between the NSA and all the HTTPS encrypted web pages from a website of interest. One key can decrypt every "secure" web page a site has ever sent. In this fairly long and technical blog, I speculate on how the NSA might, perhaps, possibly be able to see right through SSL, TLS and HTTPS.2013-06-21T16:49-04:00http://blogs.computerworld.com/encryption/22366/can-nsa-see-through-encrypted-web-pages-maybe-so2013-06-28 14:54:21attachmentSnapshot2013-06-28 14:54:21http://blogs.computerworld.com/encryption/22366/can-nsa-see-through-encrypted-web-pages-maybe-sotext/htmlutf-8blogPostDaily Kos

DestinLiepar

Barrett BrownDaily Kos: HBGary, Palantir, Prism, Facebook & The Industrial Surveillance ComplexPart 1 of several to come:
Lets begin a couple years back with the release of the hacked e-mails of defense contractor HBGary by Anonymous. Many readers will be familiar with these events as it was ...2013-06-23http://www.dailykos.com/story/2013/06/23/1218189/-HBGary-Palantir-Prism-Facebook-The-Industrial-Surveillance-Complex2013-06-28 14:54:27enDaily KosattachmentHow Spy Agency Contractors Have Already Abused Their Power | The Nation2013-09-17 20:19:52http://www.thenation.com/blog/174741/how-spy-agency-contractors-have-already-abused-their-power#axzz2X3gPL9fKtext/htmlutf-8attachmentMichael Hastings Email About FBI Investigation - Business Insider2013-09-17 20:19:37http://www.businessinsider.com/michael-hastings-email-about-fbi-investigation-2013-6text/htmlutf-8attachmentNathaniel Fick, Former CNAS Chief, Heads Cyber Targeting Firm | Defense News | defensenews.com2013-09-17 20:19:27http://www.defensenews.com/article/20130115/C4ISR01/301150007/Nathaniel-Fick-Former-CNAS-Chief-Heads-Cyber-Targeting-Firmtext/htmlwindows-1252attachmentSnapshot2013-06-28 14:54:27http://www.dailykos.com/story/2013/06/23/1218189/-HBGary-Palantir-Prism-Facebook-The-Industrial-Surveillance-Complextext/htmlutf-8attachmentThe Strange Case of Barrett Brown | The Nation2013-09-17 20:19:43http://www.thenation.com/article/174851/strange-case-barrett-brown#axzz2X3gPL9fKtext/htmlutf-8attachmentWhy Is Barrett Brown Facing 100 Years in Prison? | VICE Canada2013-09-17 20:19:31http://www.vice.com/en_ca/read/why-is-barrett-brown-facing-100-years-in-jailtext/htmlutf-8newspaperArticleWorld newsThe GuardianISSN 0261-3077

GreenwaldGlenn

AckermanSpencer

Data protectionFisa courtGeorge BushInternetNSAObama administrationPrivacySurveillancetechnologyThe NSA filesUnited StatesUS national securityWorld newsNSA collected US email records in bulk for more than two years under Obama• Secret program launched by Bush continued 'until 2011'• Fisa court renewed collection order every 90 days• Current NSA programs still mine US internet metadata2013-06-27T11:20EDTen-GBhttp://www.guardian.co.uk/world/2013/jun/27/nsa-data-mining-authorised-obama2013-06-28 14:55:00The GuardianattachmentGuardian Snapshot2013-06-28 14:55:03http://www.guardian.co.uk/world/2013/jun/27/nsa-data-mining-authorised-obamatext/htmlutf-8newspaperArticleThreat Level

ZetterKim

Feds 'Pinged' Sprint GPS Data 8 Million Times Over a Year | Threat Level | Wired.comSprint Nextel provided law enforcement agencies with customer location data more than 8 million times between September 2008 and October 2009, accordin2009-12-01Feds ‘Pinged’ Sprint GPS Data 8 Million Times Over a Yearhttp://www.wired.com/threatlevel/2009/12/gps-data/2013-06-28 14:55:07attachmentSnapshot2013-06-28 14:55:07http://www.wired.com/threatlevel/2009/12/gps-datatext/htmlutf-8radioBroadcast

WikiLeaks Volunteer Was a Paid Informant for the FBI | Threat Level | Wired.comSigurdur “Siggi” Thordarson served two masters, working for the secret-spilling website and simultaneously spilling its secrets to the U.S. government in exchange for $5,000.2013-06-27http://www.wired.com/threatlevel/2013/06/wikileaks-mole/2013-06-28 14:55:15attachmentSnapshot2013-06-28 14:55:15http://www.wired.com/threatlevel/2013/06/wikileaks-mole/text/htmlutf-8webpage

National Security AgencySurveillance of Citizens by GovernmentUnited States Politics and GovernmentUSA PATRIOT ActThe Criminal N.S.A.The N.S.A.’s mass surveillance violates the Constitution and has never been authorized by Congress or the courts.2013-06-27https://www.nytimes.com/2013/06/28/opinion/the-criminal-nsa.html2013-06-28 14:56:37NYTimes.comattachmentNew York Times Snapshot2013-06-28 14:56:37https://www.nytimes.com/2013/06/28/opinion/the-criminal-nsa.html?_r=0text/htmlutf-8newspaperArticleBusiness Insider

Infrastructure of a police state - World Socialist Web Site2013-06-25https://www.wsws.org/en/articles/2013/06/25/infr-j25.html2013-06-28 15:05:03attachmentInfrastructure of a police state - World Socialist Web Site2013-06-28 15:05:04https://www.wsws.org/en/articles/2013/06/25/infr-j25.htmltext/htmlutf-8blogPostSchneier on security

SchneierBruce

Schneier on Security: Finding Sociopaths on Facebook2013-06-19https://www.schneier.com/blog/archives/2013/06/finding_sociopa.html2013-06-28 15:05:08attachmentSchneier on Security: Finding Sociopaths on Facebook2013-06-28 15:05:09https://www.schneier.com/blog/archives/2013/06/finding_sociopa.htmltext/htmlutf-8webpageOffice of the Director of National Intelligence

Mobile Call Logs Can Reveal a Lot to the NSA | MIT Technology Review2013-06-18http://www.technologyreview.com/news/516181/mobile-call-logs-can-reveal-a-lot-to-the-nsa/2013-06-28 15:16:03attachmentMobile Call Logs Can Reveal a Lot to the NSA | MIT Technology Review2013-06-28 15:16:04http://www.technologyreview.com/news/516181/mobile-call-logs-can-reveal-a-lot-to-the-nsa/text/htmlutf-8webpageNew York Times

Why Monopolies Make Government Spying Easier : The New Yorker2013-06-18http://www.newyorker.com/online/blogs/elements/2013/06/why-monopolies-make-spying-easier.html?mbid=social_retweet2013-06-28 15:16:38attachmentWhy Monopolies Make Government Spying Easier : The New Yorker2013-06-28 15:16:39http://www.newyorker.com/online/blogs/elements/2013/06/why-monopolies-make-spying-easier.html?mbid=social_retweettext/htmliso-8859-1webpageForbes

FAQ: What You Need to Know About the NSA’s Surveillance Programs - ProPublica2013-06-27https://www.propublica.org/article/nsa-data-collection-faq2013-06-28 15:19:34attachmentFAQ: What You Need to Know About the NSA’s Surveillance Programs - ProPublica2013-06-28 15:19:35https://www.propublica.org/article/nsa-data-collection-faqtext/htmlutf-8webpage

U.S Government Surveillance: Bad for Silicon Valley, Bad for Democracy Around the World2013-06-28http://www.theatlantic.com/technology/archive/2013/06/us-government-surveillance-bad-for-silicon-valley-bad-for-democracy-around-the-world/277335/2013-06-29 15:05:28attachmentU.S Government Surveillance: Bad for Silicon Valley, Bad for Democracy Around the World - Christopher Jon Sprigman and Jennifer Granick - The Atlantic2013-06-29 15:05:29http://www.theatlantic.com/technology/archive/2013/06/us-government-surveillance-bad-for-silicon-valley-bad-for-democracy-around-the-world/277335/text/htmlutf-8blogPostTechCrunch

EvansJon

Tomorrow’s Surveillance: Everyone, Everywhere, All The Time | TechCrunch2013-06-29http://techcrunch.com/2013/06/29/tomorrows-surveillance/#2013-06-29 15:06:13attachmentTomorrow’s Surveillance: Everyone, Everywhere, All The Time | TechCrunch2013-06-29 15:06:14http://techcrunch.com/2013/06/29/tomorrows-surveillance/#text/htmlutf-8newspaperArticleReuters

NSA in Utah: Mining a mountain of data | The Salt Lake Tribune2013-06-29http://www.sltrib.com/sltrib/news/56515678-78/data-nsa-http-www.html.csp2013-07-01 19:25:32attachmentNSA in Utah: Mining a mountain of data | The Salt Lake Tribune2013-07-01 19:25:33http://www.sltrib.com/sltrib/news/56515678-78/data-nsa-http-www.html.csptext/htmlutf-8attachmentNSA in Utah: Mining a mountain of data | The Salt Lake Tribune2013-07-01 19:25:37http://www.sltrib.com/sltrib/news/56515678-78/data-nsa-http-www.html.csp?page=2text/htmlutf-8attachmentNSA in Utah: Mining a mountain of data | The Salt Lake Tribune2013-07-01 19:28:40http://www.sltrib.com/sltrib/news/56515678-78/data-nsa-http-www.html.csp?page=3text/htmlutf-8newspaperArticleBloomberg

RileyMichael

U.S. Agencies Said to Swap Data With Thousands of Firms - Bloomberg2013-06-15http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html2013-07-01 19:41:35attachmentU.S. Agencies Said to Swap Data With Thousands of Firms - Bloomberg2013-07-01 19:41:36http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.htmltext/htmlutf-8reportPersonal Privacy in an Information Society: The Report of the Privacy Protection Study Commission transmitted to President Jimmy Carter on July 12, 1977.1977-07-12Personal Privacy in an Information Societyhttp://aspe.hhs.gov/datacncl/1977privacy/c9.htm2013-07-01 19:47:45attachmentPersonal Privacy in an Information Society: Chapter 9. Government Access toPersonal Records and "Private Papers"2013-07-01 19:47:46http://aspe.hhs.gov/datacncl/1977privacy/c9.htmtext/htmlwindows-1252blogPostWired - Threat Level

indiaHow The Indian Government's 'Central Monitoring System' Makes The NSA Look Like A Paragon Of Restraint | Techdirt2013-07-01https://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml2013-07-03 21:36:03attachmentHow The Indian Government's 'Central Monitoring System' Makes The NSA Look Like A Paragon Of Restraint | Techdirt2013-07-03 21:36:04https://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtmltext/htmlwindows-1252blogPostBeneath the Waves

Moscow Metro says new tracking system is to find stolen phones; no one believes them | Ars Technica2013-07-29http://arstechnica.com/tech-policy/2013/07/moscow-metro-says-new-tracking-system-is-to-find-stolen-phones-no-one-believes-them/2013-08-02 17:49:50attachmentMoscow Metro says new tracking system is to find stolen phones; no one believes them | Ars Technica2013-08-02 17:49:51http://arstechnica.com/tech-policy/2013/07/moscow-metro-says-new-tracking-system-is-to-find-stolen-phones-no-one-believes-them/text/htmlutf-8webpage

How NSA Can Abuse Data On Americans - Business Insider2013-07-09http://www.businessinsider.com/how-nsa-can-abuse-data-on-americans-2013-72013-08-02 17:50:26attachmentHow NSA Can Abuse Data On Americans - Business Insider2013-08-02 17:50:27http://www.businessinsider.com/how-nsa-can-abuse-data-on-americans-2013-7text/htmlutf-8webpage

N.S.A. Said to Search Content of Messages to and From U.S. - NYTimes.com2013-08-08http://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html?hp&_r=1&pagewanted=all&2013-08-08 20:35:41attachmentN.S.A. Said to Search Content of Messages to and From U.S. - NYTimes.com2013-08-08 20:35:42http://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html?hp&_r=1&pagewanted=all&text/htmlutf-8webpageGlobal Post

The Cost of PRISM Will Be Larger Than ITIF Projects | Forrester Blogs2013-08-14http://blogs.forrester.com/james_staten/13-08-14-the_cost_of_prism_will_be_larger_than_itif_projects2013-08-16 17:10:31attachmentThe Cost of PRISM Will Be Larger Than ITIF Projects | Forrester Blogs2013-08-16 17:10:32http://blogs.forrester.com/james_staten/13-08-14-the_cost_of_prism_will_be_larger_than_itif_projectstext/htmlutf-8webpageHow Big Data Could Help Identify the Next Felon -- Or Blame the Wrong Guy - Bloomberghttp://www.bloomberg.com/news/2013-08-14/how-big-data-could-help-identify-the-next-felon-or-blame-the-wrong-guy.html2013-08-16 17:10:34attachmentHow Big Data Could Help Identify the Next Felon -- Or Blame the Wrong Guy - Bloomberg2013-08-16 17:10:35http://www.bloomberg.com/news/2013-08-14/how-big-data-could-help-identify-the-next-felon-or-blame-the-wrong-guy.htmltext/htmlutf-8webpageIntelligence committee under pressure to explain if they withheld crucial NSA document | World news | theguardian.comhttp://www.theguardian.com/world/2013/aug/14/nsa-intelligence-committee-under-pressure-document2013-08-16 17:14:50attachmentIntelligence committee under pressure to explain if they withheld crucial NSA document | World news | theguardian.com2013-08-16 17:14:51http://www.theguardian.com/world/2013/aug/14/nsa-intelligence-committee-under-pressure-documenttext/htmlutf-8webpageGroklaw - Forced Exposure ~pjhttp://www.groklaw.net/article.php?story=201308181204211752013-08-20 18:08:50attachmentGroklaw - Forced Exposure ~pj2013-08-20 18:08:51http://www.groklaw.net/article.php?story=20130818120421175text/htmlwindows-1252webpageEncryption Works: How to Protect Your Privacy in the Age of NSA Surveillance | Freedom of the Press Foundationhttps://pressfreedomfoundation.org/encryption-works2013-08-20 18:39:46attachmentEncryption Works: How to Protect Your Privacy in the Age of NSA Surveillance | Freedom of the Press Foundation2013-08-20 18:39:47https://pressfreedomfoundation.org/encryption-workstext/htmlutf-8webpageThe Daily Dot

The Deeper Meaning Of Miranda's Detention And The Destruction Of The Guardian's Hard Drives | Techdirt2013-08-28http://www.techdirt.com/articles/20130827/09260924322/deeper-meaning-mirandas-detention-destruction-guardians-hard-drives.shtml2013-08-30 15:34:56attachmentThe Deeper Meaning Of Miranda's Detention And The Destruction Of The Guardian's Hard Drives | Techdirt2013-08-30 15:34:57http://www.techdirt.com/articles/20130827/09260924322/deeper-meaning-mirandas-detention-destruction-guardians-hard-drives.shtmltext/htmlwindows-1252webpage

U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program - The Washington Post2013-6-06http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html2013-09-16 16:58:06attachmentNSA slides explain the PRISM data-collection program - The Washington Post2014-01-28 21:00:19http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/text/htmlutf-8attachmentU.S., British intelligence mining data from nine U.S. Internet companies in broad secret program - The Washington Post2013-09-16 16:58:07http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.htmltext/htmlutf-8attachmentU.S., British intelligence mining data from nine U.S. Internet companies in broad secret program - The Washington Post2014-01-28 21:00:01http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.htmltext/htmlutf-8webpageNSA Prism program taps in to user data of Apple, Google and others | World news | The Guardianhttp://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data2013-09-16 17:01:18attachmentNSA Prism program taps in to user data of Apple, Google and others | World news | The Guardian2013-09-16 17:01:19http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-datatext/htmlutf-8webpage

Crypto WarsSo Much for Savages: Navajo 1, Government 0 in Final Moments of Play1999-03http://moglen.law.columbia.edu/publications/yu-encrypt.html2013-09-16 17:20:16attachmentSo Much for Savages: Navajo 1, Government 0 in Final Moments of Play2013-09-16 17:20:17http://moglen.law.columbia.edu/publications/yu-encrypt.htmltext/htmlwindows-1252webpage

City Subpoenas Creator of Text Messaging Code - New York Times2008-03-30http://www.nytimes.com/2008/03/30/nyregion/30text.html?_r=2&oref=slogin&oref=slogin2013-09-16 19:43:42attachmentCity Subpoenas Creator of Text Messaging Code - New York Times2013-09-16 19:43:43http://www.nytimes.com/2008/03/30/nyregion/30text.html?_r=2&oref=slogin&oref=slogintext/htmlwindows-1252blogPostSchneier on Security

SchneierBruce

What We Don't Know About Spying on Citizens: Scarier Than What We Know2013-06-06https://www.schneier.com/essay-429.html2013-09-17 15:18:42attachmentWhat We Don't Know About Spying on Citizens: Scarier Than What We Know2013-09-17 15:18:43https://www.schneier.com/essay-429.htmltext/htmlutf-8webpageThreat Level

THE NATIONAL DATA CENTER AND PERSONAL PRIVACY2008-03-31http://blog.modernmechanix.com/the-national-data-center-and-personal-privacy/2013-09-16 19:52:01attachmentTHE NATIONAL DATA CENTER AND PERSONAL PRIVACY | Modern Mechanix2013-09-16 19:52:02http://blog.modernmechanix.com/the-national-data-center-and-personal-privacy/text/htmlutf-8webpage

Buying You: The Government's Use of Fourth-Parties to Launder Data about 'The People'Your information is for sale, and the government is buying it at alarming rates. The CIA, FBI, Justice Department, Defense Department, and other government agencies are at this very moment turning to a group of companies to provide them information that these companies can gather without the restrictions that bind government intelligence agencies. The information is gathered from sources that few would believe the government could gain unfettered access to, but which, under current Fourth Amendment doctrine and statutory protections, are completely accessible.
Fourth-parties, such as ChoicePoint or LexisNexis, are private companies that aggregate data for the government, and they comprise the private security-industrial complex that arose after the attacks of September 11, 2001. They are in the business of acquiring information, not from the information’s originator (the first-party), nor from the information’s anticipated recipient (the second-party), but from the unavoidable digital intermediaries that transmit and store the information (third-parties). These fourth-party companies act with impunity as they gather information that the government wants but would be unable to collect on its own due to Fourth Amendment or statutory prohibitions. This paper argues that when fourth-parties disclose to law enforcement information generated as a result of searches that would be violations had the government conducted the searches itself, those fourth-parties’ actions should be considered searches by agents of the government, and the data should retain privacy protections.950-10142009-09-19http://ssrn.com/abstract=14755242013-09-16attachmentBuying You: The Government's Use of Fourth-Parties to Launder Data about 'The People' by Joshua L. Simmons :: SSRN2013-09-16 20:03:45http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1475524text/htmlutf-8attachmentSSRN-id1475524.pdfapplication/pdfwebpage

RisenJames

LichtblauEric

Bush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say - New York Times2005-12-15http://emoglen.law.columbia.edu/CPC/NYT_15cnd-program.html2013-09-16 20:04:24attachmentBush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say - New York Times2013-09-16 20:04:25http://emoglen.law.columbia.edu/CPC/NYT_15cnd-program.htmltext/htmlwindows-1252webpage

The Border Is a Back Door for U.S. Device Searches - NYTimes.com2013-09-09http://www.nytimes.com/2013/09/10/business/the-border-is-a-back-door-for-us-device-searches.html?pagewanted=all&_r=02013-09-17 15:20:31attachmentThe Border Is a Back Door for U.S. Device Searches - NYTimes.com2013-09-17 15:20:32http://www.nytimes.com/2013/09/10/business/the-border-is-a-back-door-for-us-device-searches.html?pagewanted=all&_r=0text/htmlutf-8webpageOfficials Say U.S. Wiretaps Exceeded Law - NYTimes.comhttp://www.nytimes.com/2009/04/16/us/16nsa.html2013-09-17 16:18:44attachmentOfficials Say U.S. Wiretaps Exceeded Law - NYTimes.com2013-09-17 16:18:45http://www.nytimes.com/2009/04/16/us/16nsa.htmltext/htmlwindows-1252webpage

Tales from the Crypto Community | Foreign Affairs2013-09-25http://www.foreignaffairs.com/articles/140214/nadia-heninger-and-j-alex-halderman/tales-from-the-crypto-community?cid=soc-twitter-in-snapshots-tales_From_the_crypto_community-1024132013-10-25 16:20:16attachmentTales from the Crypto Community | Foreign Affairs2013-10-25 16:20:17http://www.foreignaffairs.com/articles/140214/nadia-heninger-and-j-alex-halderman/tales-from-the-crypto-community?cid=soc-twitter-in-snapshots-tales_From_the_crypto_community-102413text/htmlutf-8newspaperArticleNationalThe HinduIndia

GreenwaldGlenn

SaxenaShobhan

India among top targets of spying by NSA - The Hindu2013-09-23http://www.thehindu.com/news/national/india-among-top-targets-of-spying-by-nsa/article5157526.ece?homepage=true2013-09-23 14:31:18attachmentIndia among top targets of spying by NSA - The Hindu2013-09-23 14:31:19http://www.thehindu.com/news/national/india-among-top-targets-of-spying-by-nsa/article5157526.ece?homepage=truetext/htmlutf-8newspaperArticleSan Jose Mercury News

The making of a global security State - Le Monde diplomatique - English editionEnglish2013-06-17http://mondediplo.com/openpage/the-making-of-a-global-security-state2013-09-23 16:03:28attachmentThe making of a global security State - Le Monde diplomatique - English edition2013-09-23 16:03:29http://mondediplo.com/openpage/the-making-of-a-global-security-statetext/htmlutf-8newspaperArticleLe Monde Diplomatique

This is, hands down, the scariest part of the NSA revelations | FP Passport2013-06-10http://blog.foreignpolicy.com/posts/2013/06/10/prism_isn_t_the_scariest_part_of_the_nsa_revelations_phone_metadata2013-09-23 18:55:44attachmentThis is, hands down, the scariest part of the NSA revelations | FP Passport2013-09-23 18:55:45http://blog.foreignpolicy.com/posts/2013/06/10/prism_isn_t_the_scariest_part_of_the_nsa_revelations_phone_metadatatext/htmlutf-8blogPostTechdirt

CushingTim

Without Any Legal Basis, The NYPD Has Been Classifying Its Own Documents For More Than A Decade | Techdirt2013-09-13http://www.techdirt.com/articles/20130917/05251924551/without-any-legal-basis-nypd-has-been-classifying-its-own-documents-more-than-decade.shtml2013-09-23 19:12:38attachmentWithout Any Legal Basis, The NYPD Has Been Classifying Its Own Documents For More Than A Decade | Techdirt2013-09-23 19:12:39http://www.techdirt.com/articles/20130917/05251924551/without-any-legal-basis-nypd-has-been-classifying-its-own-documents-more-than-decade.shtmltext/htmlwindows-1252webpageEU Parliment agenda for September 24th, 2013 meeting of the Committee on Civil Liberties, Justice and Home Affairs2013-09-24http://www.europarl.europa.eu/meetdocs/2009_2014/organes/libe/libe_20130924_0900.htm2013-09-24 15:46:10attachment2013-09-24 15:46:11http://www.europarl.europa.eu/meetdocs/2009_2014/organes/libe/libe_20130924_0900.htmtext/htmlwindows-1252newspaperArticleNew York Times

Phone Records of Journalists of The Associated Press Seized by U.S. - NYTimes.com2013-05-15http://www.nytimes.com/2013/05/14/us/phone-records-of-journalists-of-the-associated-press-seized-by-us.html2013-09-24 15:56:11attachmentPhone Records of Journalists of The Associated Press Seized by U.S. - NYTimes.com2013-09-24 15:56:12http://www.nytimes.com/2013/05/14/us/phone-records-of-journalists-of-the-associated-press-seized-by-us.htmltext/htmlutf-8newspaperArticleLe Monde Diplomatique

How the United States spies on us all - Le Monde diplomatique - English editionEnglish1999-01http://mondediplo.com/1999/01/04echelon2013-09-24 16:04:19attachmentHow the United States spies on us all - Le Monde diplomatique - English edition2013-09-24 16:04:20http://mondediplo.com/1999/01/04echelontext/htmlutf-8newspaperArticleLe Monde Diplomatique

In the know - Le Monde diplomatique - English editionEnglish2001-11http://mondediplo.com/2001/11/18nsa2013-09-24 16:07:04attachmentIn the know - Le Monde diplomatique - English edition2013-09-24 16:07:05http://mondediplo.com/2001/11/18nsatext/htmlutf-8newspaperArticleNew York Times

KanterJames

Greek cellphones tapped - The New York Times2006-02-02http://www.nytimes.com/2006/02/02/world/europe/02iht-greece.html2013-09-24 16:14:19attachmentGreek cellphones tapped - The New York Times2013-09-24 16:14:20http://www.nytimes.com/2006/02/02/world/europe/02iht-greece.htmltext/htmlutf-8webpage

Scalia expects NSA program to end up in court2013-09-25http://bigstory.ap.org/article/scalia-expects-nsa-wiretaps-end-court2013-09-26 12:35:59attachmentScalia expects NSA program to end up in court2013-09-26 12:36:00http://bigstory.ap.org/article/scalia-expects-nsa-wiretaps-end-courttext/htmlutf-8webpageArs Technica

loveintLOVEINT: When NSA officers use their spying power on love interests2013-08-24http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/24/loveint-when-nsa-officers-use-their-spying-power-on-love-interests/2013-09-27 17:07:45attachmentLOVEINT: When NSA officers use their spying power on love interests2013-09-27 17:07:46http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/24/loveint-when-nsa-officers-use-their-spying-power-on-love-interests/text/htmlutf-8newspaperArticleWorld NewsThe Telegraph

Declassified Legal Opinions Show How Surveillance State Was Born | New Republic2013-09-28http://www.newrepublic.com/article/114795/declassified-legal-opinions-show-how-surveillance-state-was-born2013-09-30 15:00:15attachmentDeclassified Legal Opinions Show How Surveillance State Was Born | New Republic2013-09-30 15:00:16http://www.newrepublic.com/article/114795/declassified-legal-opinions-show-how-surveillance-state-was-borntext/htmlutf-8attachmentOp. O.L.C. Supp. - op-supp.pdf2013-09-30 15:01:16https://www.fas.org/irp/agency/doj/olc/op-supp.pdfapplication/pdfutf-8newspaperArticleNewsThe Baltimore Sun

Ken Auletta: Can the Guardian Take Its Aggressive Investigations Global? : The New Yorker2013-10-07http://www.newyorker.com/reporting/2013/10/07/131007fa_fact_auletta?currentPage=all2013-09-30 15:15:19attachmentKen Auletta: Can the Guardian Take Its Aggressive Investigations Global? : The New Yorker2013-09-30 15:15:20http://www.newyorker.com/reporting/2013/10/07/131007fa_fact_auletta?currentPage=alltext/htmlwindows-1252newspaperArticleAP

BarchfieldJenny

U.S. assassination programNews from The Associated Press2013-09-28http://hosted.ap.org/dynamic/stories/L/LT_BRAZIL_GLENN_GREENWALD?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2013-09-28-20-46-342013-09-30 15:16:02attachmentNews from The Associated Press2013-09-30 15:16:03http://hosted.ap.org/dynamic/stories/L/LT_BRAZIL_GLENN_GREENWALD?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2013-09-28-20-46-34text/htmlwindows-1252newspaperArticleWall Street Journal

N.S.A. Gathers Data on Social Connections of U.S. Citizens - NYTimes.com2013-09-28http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html?pagewanted=all&_r=1&2013-09-30 15:21:25attachmentN.S.A. Gathers Data on Social Connections of U.S. Citizens - NYTimes.com2013-09-30 15:21:26http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html?pagewanted=all&_r=1&text/htmlutf-8newspaperArticleGuardian

BallJames

NSA stores metadata of millions of web users for up to a year, secret files show | World news | theguardian.com2013-09-30http://www.theguardian.com/world/2013/sep/30/nsa-americans-metadata-year-documents2013-09-30 17:47:37attachmentNSA stores metadata of millions of web users for up to a year, secret files show | World news | theguardian.com2013-09-30 17:47:38http://www.theguardian.com/world/2013/sep/30/nsa-americans-metadata-year-documentstext/htmlutf-8newspaperArticleAPWhite House defends NSA amid social mapping report2013-09-30http://bigstory.ap.org/article/white-house-defends-nsa-amid-social-mapping-report2013-09-30 19:26:17attachmentWhite House defends NSA amid social mapping report2013-09-30 19:26:18http://bigstory.ap.org/article/white-house-defends-nsa-amid-social-mapping-reporttext/htmlutf-8newspaperArticleNew York Times

CarrDavid

For Journalists, More Firepower to Protect Sources and Secrets - NYTimes.com2013-09-29http://www.nytimes.com/2013/09/30/business/media/for-journalists-more-firepower-to-protect-sources-and-secrets.html?smid=tw-share2013-09-30 20:14:45attachmentFor Journalists, More Firepower to Protect Sources and Secrets - NYTimes.com2013-09-30 20:14:46http://www.nytimes.com/2013/09/30/business/media/for-journalists-more-firepower-to-protect-sources-and-secrets.html?smid=tw-sharetext/htmlutf-8blogPostTechdirt

Joseph NacchioQwestA CEO who resisted NSA spying is out of prison. And he feels ‘vindicated’ by Snowden leaks.2013-09-30http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/30/a-ceo-who-resisted-nsa-spying-is-out-of-prison-and-he-feels-vindicated-by-snowden-leaks/2013-09-30 21:44:49attachmentA CEO who resisted NSA spying is out of prison. And he feels ‘vindicated’ by Snowden leaks.2013-09-30 21:44:50http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/30/a-ceo-who-resisted-nsa-spying-is-out-of-prison-and-he-feels-vindicated-by-snowden-leaks/text/htmlutf-8newspaperArticleOpinionGuardian

Metadata May Not Catch Many Terrorists, But It's Great at Busting Journalists' Sources | FP Passport2013-09-24http://blog.foreignpolicy.com/posts/2013/09/24/metadata_may_not_catch_many_terrorists_but_its_great_at_busting_journalists_sources2013-09-30 21:50:57attachmentMetadata May Not Catch Many Terrorists, But It's Great at Busting Journalists' Sources | FP Passport2013-09-30 21:50:58http://blog.foreignpolicy.com/posts/2013/09/24/metadata_may_not_catch_many_terrorists_but_its_great_at_busting_journalists_sourcestext/htmlutf-8newspaperArticleNew York Times

Mall of America visitors unknowingly end up in counterterrorism reports | The Center for Investigative Reporting2011-09-07http://cironline.org/reports/mall-america-visitors-unknowingly-end-counterterrorism-reports-29142013-10-01 21:00:01attachmentMall of America visitors unknowingly end up in counterterrorism reports | The Center for Investigative Reporting2013-10-01 21:00:02http://cironline.org/reports/mall-america-visitors-unknowingly-end-counterterrorism-reports-2914text/htmlutf-8webpageCenter for Investigative Reporting

Former NSA chief: western intelligence agencies must be more transparent | World news | The Guardian2013-09-30http://www.theguardian.com/world/2013/sep/30/nsa-director-intelligence-public-support2013-10-02 16:23:21attachmentFormer NSA chief: western intelligence agencies must be more transparent | World news | The Guardian2013-10-02 16:23:22http://www.theguardian.com/world/2013/sep/30/nsa-director-intelligence-public-supporttext/htmlutf-8newspaperArticleNew York Times

Former DHS Chief Privacy Officer Recounts How She Was Regularly Called A 'Terrorist' By The Intelligence Community | Techdirt2013-10-02http://www.techdirt.com/articles/20131002/02052624725/former-dhs-chief-privacy-officer-recounts-how-she-was-regularly-called-terrorist-intelligence-community.shtml2013-10-02 16:24:38attachmentFormer DHS Chief Privacy Officer Recounts How She Was Regularly Called A 'Terrorist' By The Intelligence Community | Techdirt2013-10-02 16:24:39http://www.techdirt.com/articles/20131002/02052624725/former-dhs-chief-privacy-officer-recounts-how-she-was-regularly-called-terrorist-intelligence-community.shtmltext/htmlwindows-1252magazineArticleLe Monde Diplomatique

NSA Involvement in NIST Encryption Standards Could Make Companies Less Competitive2013-10-01http://blogs.wsj.com/cio/2013/10/01/nsas-involvement-in-standards-setting-erodes-trust/?KEYWORDS=Snowden2013-10-02 19:10:16attachmentNSA Involvement in NIST Encryption Standards Could Make Companies Less Competitive - The CIO Report - WSJ2013-10-02 19:10:17http://blogs.wsj.com/cio/2013/10/01/nsas-involvement-in-standards-setting-erodes-trust/?KEYWORDS=Snowdentext/htmlutf-8newspaperArticleAssociated Press

BraunStephen

News from The Associated Press2013-10-02http://hosted.ap.org/dynamic/stories/U/US_NSA_SURVEILLANCE_SOCIAL_NETWORKS?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2013-10-02-11-33-152013-10-02 19:16:32attachmentNews from The Associated Press2013-10-02 19:16:33http://hosted.ap.org/dynamic/stories/U/US_NSA_SURVEILLANCE_SOCIAL_NETWORKS?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2013-10-02-11-33-15text/htmlwindows-1252newspaperArticleThe Washington Times

Critics of U.S. Security State Can’t Get Visas -- Daily Intelligencer2013-10-03http://nymag.com/daily/intelligencer/2013/09/critics-of-us-security-state-cant-get-visas.html2013-10-03 17:07:01attachmentCritics of U.S. Security State Can’t Get Visas -- Daily Intelligencer2013-10-03 17:07:02http://nymag.com/daily/intelligencer/2013/09/critics-of-us-security-state-cant-get-visas.htmltext/htmlutf-8newspaperArticleGuardian

BonnerRaymond

'Company A': the telecom that coached the FBI on how to spy on me | Raymond Bonner | Comment is free | theguardian.com2013-10-03http://www.theguardian.com/commentisfree/2013/oct/03/company-a-telecom-coached-fbi-spy2013-10-03 21:41:29attachment'Company A': the telecom that coached the FBI on how to spy on me | Raymond Bonner | Comment is free | theguardian.com2013-10-03 21:41:30http://www.theguardian.com/commentisfree/2013/oct/03/company-a-telecom-coached-fbi-spytext/htmlutf-8newspaperArticleWashington Post

The Copyright Monopoly Can Only Be Enforced With Mass Wiretapping, And Must Therefore Be Torpedoed | TorrentFreak2013-10-13http://torrentfreak.com/copyright-monopoly-must-be-torpedoed-131013/2013-10-14 18:54:00attachmentThe Copyright Monopoly Can Only Be Enforced With Mass Wiretapping, And Must Therefore Be Torpedoed | TorrentFreak2013-10-14 18:54:01http://torrentfreak.com/copyright-monopoly-must-be-torpedoed-131013/text/htmlutf-8webpageSchneier on Security: Fingerprinting Burner Phoneshttps://www.schneier.com/blog/archives/2013/10/fingerprinting_5.html2013-10-14 18:54:05attachmentSchneier on Security: Fingerprinting Burner Phones2013-10-14 18:54:06https://www.schneier.com/blog/archives/2013/10/fingerprinting_5.htmltext/htmlutf-8webpageNew York Times

The US is losing control of the internet (Wired UK)2013-10-12http://www.wired.co.uk/news/archive/2013-10/12/us-internet-control2013-10-14 18:54:48en-GBattachmentThe US is losing control of the internet (Wired UK)2013-10-14 18:54:49http://www.wired.co.uk/news/archive/2013-10/12/us-internet-controltext/htmlutf-8webpage

The PR fight to convince you privacy is worthless | Toronto Star2013-10-11http://www.thestar.com/news/gta/2013/10/11/the_pr_fight_to_convince_you_privacy_is_worthless.html2013-10-14 18:55:53attachmentThe PR fight to convince you privacy is worthless | Toronto Star2013-10-14 18:55:54http://www.thestar.com/news/gta/2013/10/11/the_pr_fight_to_convince_you_privacy_is_worthless.htmltext/htmlutf-8webpageLeave oversight of surveillance to the judges | David Bickford | Comment is free | The Guardianhttp://www.theguardian.com/commentisfree/2013/oct/11/mi5-public-open-mind-secrecy-security2013-10-14 18:56:49attachmentLeave oversight of surveillance to the judges | David Bickford | Comment is free | The Guardian2013-10-14 18:56:50http://www.theguardian.com/commentisfree/2013/oct/11/mi5-public-open-mind-secrecy-securitytext/htmlutf-8webpage

AckermanElise

AT&T-Backed Report Prompts Question: Should The U.S. Get Rid Of Phone Lines? - Forbes2013-10-11http://www.forbes.com/sites/eliseackerman/2013/10/11/att-backed-report-prompts-question-should-the-u-s-get-rid-of-phone-lines/2013-10-14 18:57:45attachmentAT&T-Backed Report Prompts Question: Should The U.S. Get Rid Of Phone Lines? - Forbes2013-10-14 18:57:46http://www.forbes.com/sites/eliseackerman/2013/10/11/att-backed-report-prompts-question-should-the-u-s-get-rid-of-phone-lines/text/htmlutf-8webpageGCHQ mass surveillance putting right to challenge state at risk, say lawyers | UK news | The Guardianhttp://www.theguardian.com/law/2013/oct/13/gchq-surveillance-right-challenge-state-law2013-10-14 19:01:49attachmentGCHQ mass surveillance putting right to challenge state at risk, say lawyers | UK news | The Guardian2013-10-14 19:01:50http://www.theguardian.com/law/2013/oct/13/gchq-surveillance-right-challenge-state-lawtext/htmlutf-8webpage

What the Spies Knew: The Secret World of Anglo-American Intelligence - The Daily Beast2013-09-21http://www.thedailybeast.com/articles/2013/09/21/what-the-spies-knew-the-secret-world-of-anglo-american-intelligence.html?utm_source=buffer&utm_campaign=Buffer&utm_content=buffer1cba9&utm_medium=twitter2013-10-17 17:14:55attachmentWhat the Spies Knew: The Secret World of Anglo-American Intelligence - The Daily Beast2013-10-17 17:14:56http://www.thedailybeast.com/articles/2013/09/21/what-the-spies-knew-the-secret-world-of-anglo-american-intelligence.html?utm_source=buffer&utm_campaign=Buffer&utm_content=buffer1cba9&utm_medium=twittertext/htmlutf-8webpage

The Snowden files: why the British public should be worried about GCHQ | World news | The Guardian2013-10-03http://www.theguardian.com/world/2013/oct/03/edward-snowden-files-john-lanchester2013-10-17 17:50:36attachmentThe Snowden files: why the British public should be worried about GCHQ | World news | The Guardian2013-10-17 17:50:37http://www.theguardian.com/world/2013/oct/03/edward-snowden-files-john-lanchestertext/htmlutf-8webpage

Aaron Swartz’s last gift to journalism and online privacy finds a new home2013-10-15http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/15/aaron-swartzs-last-gift-to-journalism-and-online-privacy-finds-a-new-home/2013-10-17 20:51:46attachmentAaron Swartz’s last gift to journalism and online privacy finds a new home2013-10-17 20:51:47http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/15/aaron-swartzs-last-gift-to-journalism-and-online-privacy-finds-a-new-home/text/htmlutf-8webpageDoJ: If we can track one American, we can track all Americans | Ars Technicahttp://arstechnica.com/tech-policy/2013/10/doj-if-we-can-track-one-american-we-can-track-all-americans/2013-10-17 20:53:46attachmentDoJ: If we can track one American, we can track all Americans | Ars Technica2013-10-17 20:53:47http://arstechnica.com/tech-policy/2013/10/doj-if-we-can-track-one-american-we-can-track-all-americans/text/htmlutf-8webpageThe Atlantic

Stanford researchers discover ‘alarming’ method for phone tracking, fingerprinting through sensor flaws | The Technology Chronicles | an SFGate.com blog2013-10-17http://blog.sfgate.com/techchron/2013/10/10/stanford-researchers-discover-alarming-method-for-phone-tracking-fingerprinting-through-sensor-flaws/2013-10-17 21:32:36attachmentStanford researchers discover ‘alarming’ method for phone tracking, fingerprinting through sensor flaws | The Technology Chronicles | an SFGate.com blog2013-10-17 21:32:37http://blog.sfgate.com/techchron/2013/10/10/stanford-researchers-discover-alarming-method-for-phone-tracking-fingerprinting-through-sensor-flaws/text/htmlutf-8webpageNSA Veterans: The White House Is Hanging Us Out to Dry - By Shane Harris | Foreign Policyhttp://www.foreignpolicy.com/articles/2013/10/10/nsa_veterans_the_white_house_is_hanging_us_out_to_dry2013-10-17 21:33:42attachmentNSA Veterans: The White House Is Hanging Us Out to Dry - By Shane Harris | Foreign Policy2013-10-17 21:33:43http://www.foreignpolicy.com/articles/2013/10/10/nsa_veterans_the_white_house_is_hanging_us_out_to_drytext/htmlutf-8webpageEditors on the NSA files: 'What the Guardian is doing is important for democracy' | World news | The Guardianhttp://www.theguardian.com/world/2013/oct/10/guardian-democracy-editors2013-10-17 21:34:30attachmentEditors on the NSA files: 'What the Guardian is doing is important for democracy' | World news | The Guardian2013-10-17 21:34:31http://www.theguardian.com/world/2013/oct/10/guardian-democracy-editorstext/htmlutf-8webpage

warrantless wiretapThe new technology at the root of the NSA wiretap scandal2005-12-20http://arstechnica.com/uncategorized/2005/12/5808-2/2013-11-05 20:24:22attachmentThe new technology at the root of the NSA wiretap scandal | Ars Technica2013-11-05 20:24:23http://arstechnica.com/uncategorized/2005/12/5808-2/text/htmlutf-8blogPostArs Technica

Q. What could a boarding pass tell an identity fraudster about you? A. Way too much2006-05-02http://www.theguardian.com/business/2006/may/03/theairlineindustry.idcards2013-11-05 20:27:07attachmentQ. What could a boarding pass tell an identity fraudster about you? A. Way too much | Business | The Guardian2013-11-05 20:27:08http://www.theguardian.com/business/2006/may/03/theairlineindustry.idcardstext/htmlutf-8newspaperArticleTechnologyNew York Times

Facebook's Beacon More Intrusive Than Previously Thought2007-11-30http://www.pcworld.com/article/140182/article.html2013-11-05 20:34:19attachmentFacebook's Beacon More Intrusive Than Previously Thought | PCWorld2013-11-05 20:34:20http://www.pcworld.com/article/140182/article.htmltext/htmlutf-8newspaperArticleNew York Times

HafnerKatie

RichtelMatt

Google Resists U.S. Subpoena of Search Data2006-01-19http://emoglen.law.columbia.edu/CPC/NYT_20google.html2013-11-05 20:35:48attachmentGoogle Resists U.S. Subpoena of Search Data - New York Times2013-11-05 20:35:49http://emoglen.law.columbia.edu/CPC/NYT_20google.htmltext/htmlwindows-1252newspaperArticleNew York Times

HafnerKatie

After Subpoenas, Internet Searches Give Some Pause2006-01-25http://emoglen.law.columbia.edu/CPC/NYT_25privacy.html2013-11-05 20:36:50attachmentAfter Subpoenas, Internet Searches Give Some Pause - New York Times2013-11-05 20:36:51http://emoglen.law.columbia.edu/CPC/NYT_25privacy.htmltext/htmlwindows-1252newspaperArticleNew York Times

RisenJames

LichtblauEric

warrantless wiretapBush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say2005-12-15http://emoglen.law.columbia.edu/CPC/NYT_15cnd-program.html2013-11-05 20:37:22attachmentBush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say - New York Times2013-11-05 20:37:23http://emoglen.law.columbia.edu/CPC/NYT_15cnd-program.htmltext/htmlwindows-1252attachmentDoJ Letter on Legal Authority for NSA Surveillance - spying_doj122205.pdf2013-11-05 20:43:18http://emoglen.law.columbia.edu/CPC/spying_doj122205.pdfapplication/pdfutf-8attachmentLegal Authorities Supporting the Activities of the National Security Agency Described by the President - spying_doj011906.pdf2013-11-05 20:49:21http://emoglen.law.columbia.edu/CPC/spying_doj011906.pdfapplication/pdfutf-8attachmentPresidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information - spying_crs010506.pdf2013-11-05 20:43:22http://emoglen.law.columbia.edu/CPC/spying_crs010506.pdfapplication/pdfutf-8newspaperArticleWashington Post